CRYPTOGRAPHY DATA ENCRYPTION METHOD PATTERN REVERSE MULTIPLICATION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.15.216223

Keywords:

key; encryption; decryption; device resources; processing speed

Abstract

The task of unlocking a private cryptographic method of encryption using a path of victories of additional and already essential tools is considered. The process of defending data is to change the internal structure of data. Existing cryptographic methods are covered on the Internet, so it was decided to show the principle of establishing a public encryption method for any data. The processing process can take a significant amount of time for sufficient amounts of data, so this paper will demonstrate the processing process using the resources of the device. This modification will increase the efficiency of the proposed methodology to increase the level of data protection. Due to their own approaches, people who try to obtain information illegally will be less likely to successfully obtain valid data. The application of the methodology can be used in different digital areas, individual means of communication, general data exchange, security packages contained in the network.

Downloads

Download data is not yet available.

References

Sharma, M. K., Somwanshi, D. (2018). Improvement in Homomorphic Encryption Algorithm with Elliptic Curve Cryptography and OTP Technique. In 2018 3rd International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE). IEEE. https://doi.org/10.1109/icraie.2018.8710434.

Gupta, S., Isha, Bhattacharya, A., Gupta, H. (2021). Analysis of Social Engineering Attack on Cryptographic Algorithm. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE. https://doi.org/10.1109/icrito51393.2021.9596568.

Chaudhary, P., Gupta, R., Singh, A., Majumder, P. (2019). Analysis and Comparison of Various Fully Homomorphic Encryption Techniques. In 2019 International Conference on Computing, Power and Communication Technologies (GUCON) (p. 58–62).

Comon-Lundh, H., Cortier, V., Zălinescu, E. (2010). Deciding security properties for cryptographic protocols. application to key cycles. ACM Transactions on Computational Logic, 11(2), 1–42. https://doi.org/10.1145/1656242.1656244.

Gitanjali, J., Jeyanthi, N., Ranichandra, C., Pounambal, M. (2014). ASCIi based cryptography using unique id, matrix multiplication and palindrome number. In 2014 International Symposium on Networks, Computers and Communications (ISNCC). IEEE. https://doi.org/10.1109/sncc.2014.6866509

Zaw, T. M., Thant, M., Bezzateev, S. V. (2019). Database Security with AES Encryption, Elliptic Curve Encryption and Signature. In 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE. https://doi.org/10.1109/weconf.2019.8840125.

Yu, L., Wang, Z., Wang, W. (2012). The Application of Hybrid Encryption Algorithm in Software Security. In 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE. https://doi.org/10.1109/cicn.2012.195.

Rad, N. B., Shah-Hosseini, H. (2008). GBHE: Grid-Based Cryptography with AES Algorithm. In 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE. https://doi.org/10.1109/iccee.2008.36.

Atmaja, I. M. A. D. S., Astawa, I. N. G. A., Wisswani, N. W., Nugroho, I. M. R. A., Sunu, P. W., Wiratama, I. K. (2020). Document Encryption Through Asymmetric RSA Cryptography. In 2020 International Conference on Applied Science and Technology (iCAST). IEEE. https://doi.org/10.1109/icast51016.2020.9557723.

Lin, C., Ran, J., Deng, D., Zhang, N., Wang, J. (2020). Research on Key-bytes Encryption Technology of SDH Channel. In 2020 International Conference on Robots & Intelligent System (ICRIS). IEEE. https://doi.org/10.1109/icris52159.2020.00059.

Alshahrani, A. M., Walker, S. (2014). A novel encryption solution for real time applications. In 2014 Third International Conference on e-Technologies and Networks for Development (ICeND). IEEE. https://doi.org/10.1109/icend.2014.6991356.

Keerthi, K., Surendiran, B. (2017). Elliptic curve cryptography for secured text encryption. In 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT). IEEE. https://doi.org/10.1109/iccpct.2017.8074210.

Yue Shen, Hanwen Zhang, Guohai Liu, Hui Liu, Wei Xia, Hongxuan Wu. (2014). Power quality data compression based on sparse representation and compressed sensing. In 2014 11th World Congress on Intelligent Control and Automation (WCICA). IEEE. https://doi.org/10.1109/wcica.2014.7053666.

Atar, E., Ersoy, O. K., Ozyilmaz, L. (2016). Character/text data compression and encryption by compressive sensing and hybrid cryptography. In 2016 24th Signal Processing and Communication Application Conference (SIU). IEEE. https://doi.org/10.1109/siu.2016.7495753

Daemen, J., Claesen, L., Genoe, M., Peeters, G., Govaerts, R., Vandewalle, J. (1993). A cryptographic chip for ISDN and high speed multi-media applications. In IEEE Workshop on VLSI Signal Processing. IEEE. https://doi.org/10.1109/vlsisp.1993.404507.

Downloads


Abstract views: 315

Published

2022-03-31

How to Cite

Kulibaba, S., & Kurchenko, O. . (2022). CRYPTOGRAPHY DATA ENCRYPTION METHOD PATTERN REVERSE MULTIPLICATION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(15), 216–223. https://doi.org/10.28925/2663-4023.2022.15.216223